Loading…
13 June
Learn More and Register to Attend

The Sched app allows you to build your schedule but is not a substitute for your event registration. You must be registered for KeycloakCon Japan 2025 to participate in the sessions. If you have not registered but would like to join us, please go to the event registration page to purchase a registration.

Please note: This schedule is automatically displayed in Japan Standard Time (UTC+9:00)To see the schedule in your preferred timezone, please select from the drop-down menu to the right, above "Filter by Date." The schedule is subject to change and session seating is available on a first-come, first-served basis. 
Type: Breakout Sessions clear filter
Friday, June 13
 

14:40 JST

Keycloakify: A Practical Toolkit for Customizing Keycloak Interfaces - Joseph Garrone, Insee
Friday June 13, 2025 14:40 - 14:55 JST
Keycloakify is an open-source tool that simplifies theming in Keycloak by enabling the use of modern frameworks like React, Angular, and Svelte.

It supports customization of login, account, admin, and email interfaces, with real-time previews and standard frontend tooling.

In this session, we’ll walk through how it works, how it’s used in production environments, and how it compares to Keycloak’s built-in theming system.
Speakers
avatar for Joseph Garrone

Joseph Garrone

Lead Platform Tech, Insee
Creator of Keycloakify & oidc-spa onyxia.sh lead
Friday June 13, 2025 14:40 - 14:55 JST
Level 1 | Apollon
  Breakout Sessions

15:25 JST

Enhancing User Experience With Native Authentication and Passkeys in Keycloak - Martin Besozzi, TwoGenIdentity
Friday June 13, 2025 15:25 - 15:40 JST
If you are tired of browser-based authentication, which relies on the traditional redirect model or browser pop-ups in native app scenarios, a proposed standard called OAuth 2.0 for First-Party Applications offers an alternative. This specification introduces an API-based authentication approach, allowing first-party apps to control the login experience based on information returned by the Identity Provider.

As a result, friction can be reduced, and potential user drop-off minimized, enhancing the overall user experience. Additionally, with Passkeys, both UX and security are further improved thanks to their phishing-resistant authentication, where the user can perform user verification (UV) using methods such as Face ID, Touch ID, or a PIN.

The purpose of this presentation is to review the specs and provide an overview of its benefits.
Speakers
avatar for Martin Besozzi

Martin Besozzi

Identity & Access Management Architect, TwoGenIdentity
Martin Besozzi is a Founder and experienced Identity and Access Management (IAM) Architect with over 18 years of industry expertise. He specializes in designing and implementing robust IAM solutions using a variety of commercial and open-source IAM frameworks, aiming to achieve both... Read More →
Friday June 13, 2025 15:25 - 15:40 JST
Level 1 | Apollon
  Breakout Sessions

15:45 JST

Standardizing Authentication Flows in Keycloak Environments – Efficient Authorization Strategies Using OPA - Yuta Kato, CyberAgent, Inc.
Friday June 13, 2025 15:45 - 15:50 JST
In this session, we will explain how we standardized and streamlined authentication flows to address the growing workload faced by engineers due to the rapid increase in authentication services.

To tackle the challenging task of building individual authentication flows for over 100 services, we adopted an implementation approach that defines authorization levels using role information and leverages attribute data stored in Keycloak.

By accurately linking user information with imported role data and standardizing authentication flows, we enabled faster updates to authorization systems. Additionally, we implemented centralized policy management for each client using OPA (Open Policy Agent) and policy language, significantly improving maintenance efficiency.

This session will provide practical and scalable design strategies and implementation methods for building robust systems that address au
Speakers
avatar for Yuta Kato

Yuta Kato

Software Engineer, CyberAgent, Inc.
Yuta Kato is a Software Engineer at CyberAgent, Inc. He previously built data infrastructure and machine learning workflows for ABEMA. Currently, he is part of the Group IT Promotion Division, where he manages identity systems for the entire CyberAgent Group and develops Keycloak... Read More →
Friday June 13, 2025 15:45 - 15:50 JST
Level 1 | Apollon
  Breakout Sessions

15:55 JST

How To Manage Keycloak Securely by Using Terraform on Google Cloud - Atsushi Kitano, Cloud Ace
Friday June 13, 2025 15:55 - 16:05 JST
We have launched a new service which monitors customers' systems.
It uses Keycloak to authenticate for customers and developers to use our service components, for instance, Grafana, ArgoCD, Backstage, Redmine, and so on.

So, Keycloak has personal information, and we have to manage it securely.
We're using Terraform to configure Keycloak, not for making mistakes due to creating by hand. And we don't want to encounter errors when running Terraform code from the developer's PC.
So we're running it from the CD agent. We use Cloud Build, a Google Cloud product, because it provides a private pool that allows us to use a specific IP address.

We'll introduce how to build this CD system and how to use Terraform in my session.
Speakers
avatar for Atsushi Kitano

Atsushi Kitano

DevSecOps Division Expert, Cloud Ace
After researching automation technology related to IT system development and construction at a major SI company, he was engaged in the construction and operation management of private cloud infrastructure used throughout the company at division. After that, he worked on the development... Read More →
Friday June 13, 2025 15:55 - 16:05 JST
Level 1 | Apollon
  Breakout Sessions

16:10 JST

Fine-grained Access Control in Practicec :From RBAC To ABAC - Toshal Khawale, Strategy
Friday June 13, 2025 16:10 - 16:25 JST
As organizations undergo digital transformation and adopt zero-trust security models, traditional role-based access control (RBAC) is becoming insufficient.
The new, volatile landscapes we face necessitate precise and context-based authorizations—thus the advent of attribute-based access control (ABAC) is here!This session will take IAM professionals through the real journey from RBAC to ABAC using Keycloak. We will highlight that it is possible to utilize an approach that eliminates static roles and also place policies on user attributes, resource exceptionalities, times, locations, etc. Participants will see real-world scenarios—like prohibiting financial transactions elevated by the age of an accounting account, or only allowing access to healthcare records when an active shift is scheduled—and how to design, deploy, and govern access control policies programmatically and at scale.The session will substantiate my experiences with building access control policies by addressing common struggles we all share—policy complexity, policy performance, etc.—and demonstrate how to extend Keycloak's policy authority into external policy engines for advanced policing. It aims to provide useful operational strategies and tested patterns for those either modernizing legacy technologies or creating cloud-centric applications to deliver compliant and secure access control.
Speakers
avatar for Toshal Khawale

Toshal Khawale

Director and Product Owner, Strategy
Seasoned Tech Leader with 21+ years in Engineering leadership with expertise on AWS, Azure, Devops ecosystem. My expertise lies in Solution Consulting and design, with a particular focus on crafting and deploying solutions on industry-leading Cloud platforms such as AWS, Microsoft... Read More →
Friday June 13, 2025 16:10 - 16:25 JST
Level 1 | Apollon
  Breakout Sessions

16:30 JST

Fine-Grained Authorization & Beyond: Mastering Keycloak Patterns in AI-infused Apps - Daniel Oh, Red Hat
Friday June 13, 2025 16:30 - 16:45 JST
Securing a single application with Keycloak and OIDC/OAuth 2.0 is straightforward, but what about complex microservice architectures, especially those incorporating AI capabilities? This session explores advanced patterns and best practices for leveraging Keycloak within distributed systems built with a specific focus on securing AI applications. We'll go beyond basic authentication and RBAC to implement fine-grained authorization for accessing and utilizing AI models using Keycloak Authorization Services. Topics include efficient token propagation between services (including those hosting AI models), securing service-to-service communication, handling multi-tenancy considerations for AI services, and integrating custom Keycloak policies to control access to sensitive AI functionalities and data. Learn how to build scalable, maintainable, and highly secure microservice ecosystems, including those leveraging AI, powered by Quarkus, Langchain4j, and Keycloak.
Speakers
avatar for Daniel Oh

Daniel Oh

Senior Principal Developer Advocate, Red Hat
Daniel Oh is a Java Champion and Senior Principal Developer Advocate at Red Hat to evangelize developers for building cloud-native apps and serverless ob Kubernetes ecosystems. He's also contributing to various cloud open-source projects and ecosystems as a CNCF ambassador for accelerating... Read More →
Friday June 13, 2025 16:30 - 16:45 JST
Level 1 | Apollon
  Breakout Sessions

16:50 JST

OpenID Federation Trust Chain on Keycloak for Highly Assured Use Cases of Digital Identity Wallet - Yutaka Obuchi, Hitachi
Friday June 13, 2025 16:50 - 17:05 JST
OpenID Federation 1.0 provides a framework to build trust between a Relying Party and an OpenID Provider that have no direct relationship so that the Relying Party can send OIDC/OAuth requests to the OpenID Provider without being previously registered.

One primary use case is the trust between an Issuer and a Holder (Wallet) on W3C’s Verifiable Credential Data Model, which is getting a lot of attentions as an approach to realize the Digital Identity Wallet ecosystem.
Especially when high assurance level is needed like EU Digital Identity Wallet, OpenID Federation can provide a strong solution.

In this session:
Firstly I will explain OpenID Federation and the reason why it is important for Digital Identity Wallet ecosystem.
Then I will explain what types of roles Keycloak can play with OpenID Federation Trust Chain.
Also I will show a simple demo of client registration with OpenID Federation Trust Chain on Keycloak.
Speakers
avatar for Yutaka Obuchi

Yutaka Obuchi

Software Engineer, Hitachi
Software Engineer at Hitachi, Ltd, Digital Identity enthusiast, Keycloak(IAM OSS) contributor My recent activity related to the topic proposed for this session: https://bucchi.medium.com/building-trust-with-openid-federation-trust-chain-on-keycloak-f8ac021add3a My linkedin profile... Read More →
Friday June 13, 2025 16:50 - 17:05 JST
Level 1 | Apollon
  Breakout Sessions
 
Share Modal

Share this link via

Or copy link

Filter sessions
Apply filters to sessions.